RATIONALIZING FUNCTIONS TO IDENTIFY RE-USABLE SERVICES
First Claim
1. A method of dynamically offering upgraded services in a network comprising functions, the method comprising a computer performing the steps of:
- a) applying a similar functionality analysis on the functions of a network, comprising the steps of the computer;
i) retrieving a plurality of candidate services from the network, each functions having a description, at least one attribute, and a name;
ii) for each function, determining whether the name is the same or similar to a name of another function and if name is not the same or similar to any other function, continuing with the analysis at step (a)(vi);
iii) for each function, determining whether the description is the same or similar to a description of another function; and
if the description of a function is not the same or similar to the description of another function, determining whether the name of the function correspond to a filter used in the network,if the name of the function corresponds to a filter used in the network, continuing with the analysis at step (a)(viii);
otherwise continuing with the analysis at step (a)(vi);
iv) determining whether there is a common name which can represent the plurality of functions being compared;
if there is a common name which can represent the plurality of functions being compared, linking each of the plurality of functions with the common name and continuing with the analysis at step (a)(ix);
v) for all functions which are not linked to a common name, continuing with the analysis at step (a)(ix);
vi) for each function, determining whether the name is compliant with a verb and noun guide; and
if the name is noncompliant with the verb and noun guide;
if the function is not to be reanalyzed, deleting the function and continuing the analysis at step (a)(ix); and
if the function is to be reanalyzed, returning to step (a)(i);
vii) for each function, determining whether a proper pattern is being used;
if the proper pattern is not being used;
if the function is not to be reanalyzed, deleting the function and continuing the analysis at step (a)(ix); and
if the function is to be reanalyzed, returning to step (a)(i);
viii) for function, determining if there is a faç
ade in which the function can be associated with and if there is a faç
ade that can be associated with the function, associating the function with the faç
ade for access by a user through the facade; and
ix) storing the plurality of functions in a repository;
b) retrieving the plurality of functions stored by the similar functionality analysis from the repository, and creating a pivot table;
c) categorizing the functions within the pivot table;
d) filtering the pivot table by a functional area of the pivot table;
e) recreating the pivot table based on the functional area; and
f) differentiating the exposable functions within the pivot table from non-exposable functions by attributes of the functions.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of dynamically offering upgraded services in a network comprising functions, the method comprising a computer performing the steps of: applying a similar functionality analysis on the functions of a network; retrieving the plurality of functions stored by the similar functionality analysis from the repository, and creating a pivot table; categorizing the functions within the pivot table; filtering the pivot table by a functional area of the pivot table; recreating the pivot table based on the functional area; and differentiating the exposable functions within the pivot table from non-exposable functions by attributes of the functions.
-
Citations
15 Claims
-
1. A method of dynamically offering upgraded services in a network comprising functions, the method comprising a computer performing the steps of:
-
a) applying a similar functionality analysis on the functions of a network, comprising the steps of the computer; i) retrieving a plurality of candidate services from the network, each functions having a description, at least one attribute, and a name; ii) for each function, determining whether the name is the same or similar to a name of another function and if name is not the same or similar to any other function, continuing with the analysis at step (a)(vi); iii) for each function, determining whether the description is the same or similar to a description of another function; and
if the description of a function is not the same or similar to the description of another function, determining whether the name of the function correspond to a filter used in the network,if the name of the function corresponds to a filter used in the network, continuing with the analysis at step (a)(viii);
otherwise continuing with the analysis at step (a)(vi);iv) determining whether there is a common name which can represent the plurality of functions being compared; if there is a common name which can represent the plurality of functions being compared, linking each of the plurality of functions with the common name and continuing with the analysis at step (a)(ix); v) for all functions which are not linked to a common name, continuing with the analysis at step (a)(ix); vi) for each function, determining whether the name is compliant with a verb and noun guide; and
if the name is noncompliant with the verb and noun guide;if the function is not to be reanalyzed, deleting the function and continuing the analysis at step (a)(ix); and if the function is to be reanalyzed, returning to step (a)(i); vii) for each function, determining whether a proper pattern is being used;
if the proper pattern is not being used;if the function is not to be reanalyzed, deleting the function and continuing the analysis at step (a)(ix); and if the function is to be reanalyzed, returning to step (a)(i); viii) for function, determining if there is a faç
ade in which the function can be associated with and if there is a faç
ade that can be associated with the function, associating the function with the faç
ade for access by a user through the facade; andix) storing the plurality of functions in a repository; b) retrieving the plurality of functions stored by the similar functionality analysis from the repository, and creating a pivot table; c) categorizing the functions within the pivot table; d) filtering the pivot table by a functional area of the pivot table; e) recreating the pivot table based on the functional area; and f) differentiating the exposable functions within the pivot table from non-exposable functions by attributes of the functions. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer program product for dynamically offering upgraded services in a network comprising functions, the computer program product comprising:
-
one or more computer-readable, tangible storage devices; a) program instructions, stored on at least one of the one or more storage devices, to apply a similar functionality analysis on the functions of a network, comprising program instructions to; i) retrieve a plurality of candidate services from the network, each functions having a description, at least one attribute, and a name; ii) for each function, determine whether the name is the same or similar to a name of another function and if name is not the same or similar to any other function, continue with the analysis at step (a)(vi); iii) for each function, determine whether the description is the same or similar to a description of another function; and
if the description of a function is not the same or similar to the description of another function, determine whether the name of the function correspond to a filter used in the network,if the name of the function corresponds to a filter used in the network, continue with the analysis at step (a)(viii);
otherwise continue with the analysis at step (a)(vi);iv) determine whether there is a common name which can represent the plurality of functions being compared; if there is a common name which can represent the plurality of functions being compared, linke each of the plurality of functions with the common name and continue with the analysis at step (a)(ix); v) for all functions which are not linked to a common name, continue with the analysis at step (a)(ix); vi) for each function, determine whether the name is compliant with a verb and noun guide; and
if the name is noncompliant with the verb and noun guide;if the function is not to be reanalyzed, delete the function and continue the analysis at step (a)(ix); and if the function is to be reanalyzed, return to step (a)(i); vii) for each function, determine whether a proper pattern is being used;
if the proper pattern is not being used;if the function is not to be reanalyzed, delete the function and continue the analysis at step (a)(ix); and if the function is to be reanalyzed, return to step (a)(i); viii) for function, determine if there is a faç
ade in which the function can be associated with and if there is a faç
ade that can be associated with the function, associate the function with the faç
ade for access by a user through the facade; andix) store the plurality of functions in a repository; b) program instructions, stored on at least one of the one or more storage devices, to retrieve the plurality of functions stored by the similar functionality analysis from the repository, and create a pivot table; c) program instructions, stored on at least one of the one or more storage devices, to categorize the functions within the pivot table; d) program instructions, stored on at least one of the one or more storage devices, to filter the pivot table by a functional area of the pivot table; e) program instructions, stored on at least one of the one or more storage devices, to recreate the pivot table based on the functional area; and f) program instructions, stored on at least one of the one or more storage devices, to differentiate the exposable functions within the pivot table from non-exposable functions by attributes of the functions. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A computer system for dynamically offering upgraded services in a network comprising functions, the computer system comprising:
-
one or more processors, one or more computer-readable memories and one or more computer-readable, tangible storage devices; a) program instructions, stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, to apply a similar functionality analysis on the functions of a network, comprising program instructions to; i) retrieve a plurality of candidate services from the network, each functions having a description, at least one attribute, and a name; ii) for each function, determine whether the name is the same or similar to a name of another function and if name is not the same or similar to any other function, continue with the analysis at step (a)(vi); iii) for each function, determine whether the description is the same or similar to a description of another function; and
if the description of a function is not the same or similar to the description of another function, determine whether the name of the function correspond to a filter used in the network,if the name of the function corresponds to a filter used in the network, continue with the analysis at step (a)(viii);
otherwise continue with the analysis at step (a)(vi);iv) determine whether there is a common name which can represent the plurality of functions being compared; if there is a common name which can represent the plurality of functions being compared, linke each of the plurality of functions with the common name and continue with the analysis at step (a)(ix); v) for all functions which are not linked to a common name, continue with the analysis at step (a)(ix); vi) for each function, determine whether the name is compliant with a verb and noun guide; and
if the name is noncompliant with the verb and noun guide;if the function is not to be reanalyzed, delete the function and continue the analysis at step (a)(ix); and if the function is to be reanalyzed, return to step (a)(i); vii) for each function, determine whether a proper pattern is being used;
if the proper pattern is not being used;if the function is not to be reanalyzed, delete the function and continue the analysis at step (a)(ix); and if the function is to be reanalyzed, return to step (a)(i); viii) for function, determine if there is a faç
ade in which the function can be associated with and if there is a faç
ade that can be associated with the function, associate the function with the faç
ade for access by a user through the facade; andix) store the plurality of functions in a repository; b) program instructions, stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, to retrieve the plurality of functions stored by the similar functionality analysis from the repository, and create a pivot table; c) program instructions, stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, to categorize the functions within the pivot table; d) program instructions, stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, to filter the pivot table by a functional area of the pivot table; e) program instructions, stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, to recreate the pivot table based on the functional area; and f) program instructions, stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, to differentiate the exposable functions within the pivot table from non-exposable functions by attributes of the functions. - View Dependent Claims (12, 13, 14, 15)
-
Specification